1) Trust establishment is often the most challenging part of designing a security protocol: making sure you are talking to the correct person. Give two examples of different approaches in the literature for establishing trust and explain their caveats.